Chapter 4 Research Design, Methodology & Data 62

39
Chapter 4 Research Design, Methodology & Data 62 4 RESEARCH DESIGN, METHODOLOGY AND DATA 4.1 Research Design Framework This chapter presents a discussion on the research design, methodology and data. Research design is concerned with approaches to obtaining data / knowledge, its analysis and presentation. This is an idiographic study which is concerned with the study of a social phenomenon in its social setting i.e. learning within information systems development in Botswana and hence qualitative research methods and not quantitative methods which are commonly used in the natural sciences for the study of natural phenomena have been employed. According to Myers(1999): Qualitative research involves the use of qualitative data, such as interviews, documents, and participant observation data, to understand and explain social phenomena… In Information Systems, there has been a general shift in IS research away from technological to managerial and organisational issues, hence an increasing interest in the application of qualitative research methods’. (Myers (1999, p.1) In this research study I used a plurality of qualitative research methods as part of the research design. According to Myers (1999), the most commonly used qualitative research methods are action research, case study research and ethnography. But lately, in activity theory based studies, DWR has been adopted as the research method. I use a single case project to obtain initial understanding of the nature and complexity of the research context (Myers, 1999). This particular project was selected for this study because findings from its post implementation review indicated that there was slow systems uptake which was consistent with my concerns about learning in current practice. The use of a single case, together with interview data from an interview with a representative of the GIT, was deemed sufficient to delineate the current ISD activity and to provide the initial data used to mirror the practice. This assisted in setting the scene for practitioners to identify problems and to begin to question aspects of the current ISD practice. The case analysis also provided me with the basis for selection of participants for the subsequent change labs. Because case study research and ethnography only allow for observation by the researcher with no intervention, I had to consider the use of action research or the activity theoretical based DWR which are interventionist approaches to accommodate the intervention aspect of the research.

Transcript of Chapter 4 Research Design, Methodology & Data 62

Chapter 4 Research Design, Methodology & Data

62

4 RESEARCH DESIGN, METHODOLOGY AND DATA

4.1 Research Design Framework

This chapter presents a discussion on the research design, methodology and data. Research

design is concerned with approaches to obtaining data / knowledge, its analysis and presentation.

This is an idiographic study which is concerned with the study of a social phenomenon in its

social setting i.e. learning within information systems development in Botswana and hence

qualitative research methods and not quantitative methods which are commonly used in the

natural sciences for the study of natural phenomena have been employed. According to

Myers(1999):

‘Qualitative research involves the use of qualitative data, such as interviews, documents, and participant

observation data, to understand and explain social phenomena… In Information Systems, there has been a general

shift in IS research away from technological to managerial and organisational issues, hence an increasing interest

in the application of qualitative research methods’. (Myers (1999, p.1)

In this research study I used a plurality of qualitative research methods as part of the research

design. According to Myers (1999), the most commonly used qualitative research methods are

action research, case study research and ethnography. But lately, in activity theory based studies,

DWR has been adopted as the research method. I use a single case project to obtain initial

understanding of the nature and complexity of the research context (Myers, 1999). This

particular project was selected for this study because findings from its post implementation

review indicated that there was slow systems uptake which was consistent with my concerns

about learning in current practice. The use of a single case, together with interview data from an

interview with a representative of the GIT, was deemed sufficient to delineate the current ISD

activity and to provide the initial data used to mirror the practice. This assisted in setting the

scene for practitioners to identify problems and to begin to question aspects of the current ISD

practice. The case analysis also provided me with the basis for selection of participants for the

subsequent change labs. Because case study research and ethnography only allow for observation

by the researcher with no intervention, I had to consider the use of action research or the activity

theoretical based DWR which are interventionist approaches to accommodate the intervention

aspect of the research.

Chapter 4 Research Design, Methodology & Data

63

Between the two, I opted to use DWR because it is based on CHAT concepts. Action research is

a more generic method that can be used with any framework. Furthermore, in its attempt to

ensure scientific rigour, action research requires that all the five steps have to be completed and

reported on as part of the research study (Grant and Ngwenyana, 2003; Baskerville and Wood-

Harper, (1996,1998), whereas DWR provides more flexibility, even in terms of the starting point

and end points of the research. It’s important to note here that even though we talk about steps in

DWR / the expansive learning cycle, these are ideal typical steps and do not necessarily have to

be carried out in that order (Virkkunen and Kuutti, 2000; Toiviainen, 2007; Engeström and

Sannino, 2010). In fact, according to Engeström and Sannino (2010),

‘… it is not a universal formula of phases or stages. In fact, one probably never finds a concrete collective

learning process which would cleanly follow the ideal-typical model. The model is a heuristic conceptual

device derived from the logic of ascending from the abstract to the concrete. Every time one examines or

facilitates a potentially expansive learning process with the help of the model, one tests, criticizes and

hopefully enriches the theoretical ideas of the model.’ (Engeström and Sannino, 2010, p.7)

Engeström and Sannino (2010, p. 3) also point to a number of studies that have adopted the use

of DWR / Expansive Learning because it ‘… has been found particularly useful in analyses of

learning in non-traditional, hybrid and multi-organisational settings’, which are similar to this

research study.

DWR is a specific intervention methodology developed by Engeström (1987) that allows for the

application of CHAT concepts as discussed in Chapter 2, to work development. DWR follows

the epistemic actions as described in Chapter 3 for expansive learning and as such allows for

carrying out learning activity in collaboration between a researcher interventionist and

practitioners.

In DWR the role of the researcher as the interventionist is to facilitate a process of undertaking

the epistemic actions and create an environment where practitioners begin to analyse the current

activity based on its historical development and to think about an expansive transformation of the

activity system.

Chapter 4 Research Design, Methodology & Data

64

The research setting for DWR, which provides practitioners with the tools for taking

collaboratively expansive learning actions, is based on Vygotsky’s idea of developmental

experiment which is based on the method of dual stimulation. The purpose of these

developmental experiments by Vygotsky was to show that potential capabilities and emerging

new psychological formations in a child could be identified by analysing the formation of new

meanings or new generalisations.

The first stimulus in the DWR process as depicted in Figure 10 is provided by the researcher to

the practitioners in the form of data about problematic aspects of their daily activities and

disturbances in them in order to trigger an identification of the need for change. This could be in

the form of videotaped data or any other similar data. The general model of an activity system is

used as an intellectual tool for modelling both the systemic cause of the identified problems and

a new form of activity during the DWR process. This acts as a second stimulus. The third type of

tools / artefacts that are used as instruments of expansive learning actions are analytical concepts

and various representational means for analysing the data in the mirror and for constructing

alternative solutions for specific parts of the activity.

�������������� ����������������

�������������������������

�������� ���������� ������� ��� ����

������������� ������ ��

��� ����� ������!����"��#

������$��������

������%� ����&�������

�������������&��� �� ���

������ ������

$��������'�(�����

)��*��������������+

,�"�&�)� �� �

-�����.��� � ������

/ ��#0 �����������

������� �����

����� '��� )� ���������

Figure 10: Developmental Work Research Schematic / Design (adapted from Engeström, 1999, p. 7)

Chapter 4 Research Design, Methodology & Data

65

About the interventionist and experimental nature of the DWR approach, Engeström (1999)

states:

‘This type of design requires a bold experimental attitude rather than an attitude of a casual observer and

facilitator. Bringing about and traversing the collective zone of proximal development is experimentation

with activity systems. When practitioners face a mirror depicting their own disturbances, they often

experience them as personal failures or even crises. Powerful and unpredictable cognitive, emotional and

social dissonances are triggered.’ (Engeström, 1999, p. 7)

The phases of DWR / expansive learning were presented and discussed in Chapter 3 (Section

3.3.5). The epistemic learning actions as identified there were used for this research study

starting with obtaining initial field work data from the case project and using that as the first

stimulus. After delineating the current activity system I moved on to the next DWR intervention

phase and carried out the historical analysis and actual-empirical analyses of the ISD work

activity as a historically developed local system. On the basis of this analysis a new ISD activity

system was modelled tackling current challenges and contradictions. This was later examined in

a change laboratory session.

The Change Laboratory (CL) method, which is commonly used with DWR interventions, is a

method that was developed in the mid-1990s by researchers from Helsinki University. The CL

provides an environment for the various participants to think through and experiment with new

ways of working. It is particularly useful in supporting practitioners in the theoretical-genetic

reflection on joint activity as well as on conceptualising new practice through interactions and

discussions. The CL provides an opportunity for participants to engage in a collaborative

learning activity by carrying out systematically expansive learning actions of questioning current

ways of thinking and working, analysing and modelling the activity system, and conducting

thought experiments concerning possible changes to their work activity. During CL sessions,

participants have been observed to move from singular individual positions to the collective

agent i.e. from ‘I’ to ‘We’, which therefore requires the formation of new and shared tools, rules

and division of labour. In the CL the interventionist facilitates a process whereby participants

move between the past, the present and the future activity (Engeström et al., 1996; Engeström,

2001; Pihlaja, 2005; Hill et al., 2007).

Chapter 4 Research Design, Methodology & Data

66

In the CL method, implementation of the designed new solution, which is done in the form of

pilot experiments, usually starts while the CL sessions are still running. The implementation

typically leads to a richer and more articulated concept as solutions addressing contradictions

arising from the implementation are used to enrich the concept. The change laboratory process

typically comprises of five (5) to ten (10) sessions of two (2) to three (3) hours (i.e. 10 to 30 hour

sessions) and a varying number of follow-up sessions. Participants comprise of practitioners and

managers and where possible, users, customers or patients are invited to the sessions in order to

create the necessary tensions as their cases, problems are being looked at. Data collected from

the activity setting relating to critical incidents and problems in the current work practice are

brought to the CL sessions and play a major role in stimulating discussion, analysis and

collaborative design efforts amongst the participants. Because the CL sessions themselves are

videotaped for analysis it allows for the collection of rich longitudinal data on the discussions,

actions and interactions involved in the collaborative learning activity (Engeström et al., (1996);

Engeström, 2001; Pihlaja, 2005; Hill et al., (2007)).

The change lab method was used for this research study, but instead of short 2 to 3 hour sessions,

I only had two sessions of seven hours and five hours respectively. I restricted myself to two

long sessions because I had already anticipated that it would be difficult to get representatives

from government and the private sector if I had more sessions.

Most DWR (and Expansive learning) studies that have been carried out tend to use ethnographic

research for the initial field work and data collection (Hasu 2001; Toiviainen, 2003; Pihlaja,

2005; Kerosuo, 2006). Ethnographic research, which draws its roots from the discipline of social

and cultural anthropology is characterised by the long period of time a researcher needs to spend

in the field. The ethnographic researcher is totally immersed in the research environment as they

attempt to gain a deep understanding of what people are doing as well as the environment around

them. Though in this particular study I did not conduct an in-depth ethnography in terms of

trying to ‘… follow the people, follow the thing, follow the metaphor, follow the plot, story or

allegory, follow the life or biography, and follow the conflict (Kerosuo 2006, p. 93)’ on a day to

day or sustained basis, as such, I was around the project long enough ((i.e. from 2004 to 2011) to

Chapter 4 Research Design, Methodology & Data

67

observe what was going on. Even after the project had been completed, I continued to visit the

case site to interact with the users and find out how the system was doing.

The research framework for this study was depicted at Figure 1 (in Chapter 1) and it provides a

summary of the research approach. In the research framework the literature review, case project,

interviews, observations, archived reports and change labs were used for analysis of current ISD

practice. The literature review covers literature on current ISD practice and moves to a

theoretical analysis of situated learning theories since the research is concerned with situated

learning in the context of ISD. In 2006, I decided to carry out this research study and sought

permission from the Government of Botswana, and more specifically the then Ministry of

Communications, Science and Technology (MCST) to use ISD projects that I was engaged in as

a consultant for my research. At the same time I also sought permission from the respective

government departments who ‘owned’ the projects as well as the two private companies that had

been contracted to carry out development on the two projects I was engaged in at the time and

had earmarked for the research. The necessary permissions from MCST and other relevant

parties were granted during the first quarter of 2007.

The literature review and more specifically the case analyses provided the basis for the

collaborative redesign effort. User representatives in the analysis and redesign change labs were

drawn mainly from the two projects that I was engaged in at the time and for which permission

had been granted for research. This research study only reports on the analysis and redesign

processes and the learning that has resulted from that. The testing, implementation and diffusion

will be reported on as part of future research.

4.2 Research Questions and the Unit of Analysis This research study is concerned with four research questions.

Chapter 4 Research Design, Methodology & Data

68

Table 4 provides a summary of the research questions, data, unit of analysis and the activity

theory concepts used for analysis.

1. What constitutes Botswana’s ISD practice?

This first question seeks to understand the context of the study using the activity system

concept. I identify and describe the elements of the Botswana ISD practice in terms of

subjects, object, tools, rules, community and division of labour. I further analysed the

contradictions within and between elements of the activity system as part of understanding

the context of the study. In addition to the use of the activity system and contradiction

concepts, I also use the concept of historicity to carry out a historical analysis of the activity

based on archival data as well as interviews with a key government representative. This

constitutes the initial fieldwork of the study.

2. What are the Users and developers learning and is the learning effective?

In terms of the context of the study, there are two groups of subjects identified i.e. the Users

(i.e. all those that represent government and therefore include functional users, user

management, user IS practitioners and representatives of GIT) and the developers (i.e. those

that represent the private sector). The study seeks to establish what these two groups of

subjects are learning during current practice and establish whether the learning is effective.

Effective learning, as argued in chapter 1, will facilitate higher levels of (user) system uptake

and meaningful work practice improvement. The meaningful work improvement is

something that both the users and developers contribute towards as they engage in

development of a new IT artefact. The analysis of learning and its effectiveness was done

retrospectively, that is post-implementation and it was carried out using a model that

combines Leontiev’s concept of the hierarchal nature of activities i.e. the distinction between

activity, actions and operations and a heuristic model based on the distinction between formal

and informal learning as suggested by some learning theorists (e.g. Rogers, 2003; Malcolm et

al., 2003). Learning tasks in the case project are identified and classified as either ‘conscious’

Chapter 4 Research Design, Methodology & Data

69

or ‘unconscious’. The conclusion as to whether the learning was effective, is therefore, based

on the balance found i.e. was there a good mixture of conscious and unconscious learning in

the learning tasks? or was there more conscious or unconscious learning found?. The main

data used here is from the case project.

3. How can current ISD practice be improved in order to facilitate effective learning?

Once an understanding of current ISD practice and learning was obtained the study moved on

to trying to come up with a solution to the current learning problem. This was done through a

collaborative redesign effort with users and developers in two CL sessions where users and

developers were represented.

4. What do Users and developers learn when collaborating in the analysis, review and redesign

of ISD practice?

The concept of expansion is used in the analysis of the learning that takes place during the

analysis, review redesign of new ISD practice. I look at the interaction of the different social

actors with the common object in terms of how they perceive what can be done to improve

current practice. I study the multiple voices coming from the different representatives during

the change labs / CL sessions and try to understand the ease or difficulty with which the

social actors are able to create a shared understanding of what is going on in the process

(Hasu, 2001). I also analysed the nature of the expansion that takes place using the four

dimensions of expansion of an object as described by Hasu (2001) and Engeström and

Sannino (2010).

Chapter 4 Research Design, Methodology & Data

70

Table 4: Research Questions Summary

Research Question Data Unit of Analysis Analytical Concepts

Used

What constitutes

Botswana’s ISD practice?

Interviews,

video data from the 1st

change lab session, and

archive reports

Botswana ISD network

of activity systems

Activity system context

analysis;

Multivoicedness;

Historicity;

Contradictions

What are the users &

developers learning and is

the learning effective?

Observations from the

case project;

Interviews with Users and

Developers from the case

project;

Analysis of learning

actions from the ISD

activity system

Activity system

hierarchy; Heuristic

model based on two types

of learning i.e. conscious

and unconscious learning;

How can current practice

be improved in order to

facilitate effective

learning?

Video data from change

lab sessions

Network of activity

systems i.e. Users &

developers activity

interacting systems

Expansive learning;

Reflection-on-practice.

What do users and IS

professionals learn when

collaborating in the

review and redesign of

ISD practice?

Video data from change

lab sessions

Interacting activity

system of Users and

developers

Expansive learning;

Object expansion in

various dimensions.

4.3 Data Collection I used a wide range of data sources for this study, which is consistent with the adopted DWR

research method. I used interviews, observations, archives, and CL sessions for data collection.

The data summary is provided in Table 5.

Interviews

Other than interviews conducted with users and developers as part of the post implementation

review of the case project as well as the second project, interviews were conducted with

representatives of the government department responsible for coordination and policy direction

of all government IS / IT matters. From now onwards I shall refer to the government IT

department as GIT and the representative from that department as the GITREP.

Chapter 4 Research Design, Methodology & Data

71

One interview, specific to ISD, was conducted with a GITREP sometime in 2007 soon after I had

been granted permission to proceed with the research. This was intended to set the scene or get a

confirmation from government on the current ISD process. The interview was open ended and

based on a guideline as opposed to specific questions. I asked questions as they arose from

discussions with the GITREP but with the ultimate aim of getting an understanding of the

process from the government perspective.

I also used interview data from interviews conducted for the post implementation review of the

case project. The PIR data used was from interviews of fourteen (14) users that were interviewed

in December 2007 and due to other work commitments, the Company X (COX) representatives

were only interviewed in March 2008 and even then it was only possible to interview two (2) out

of the five (5) that were involved in this project. The two that were not interviewed were difficult

to trace because one of them left the company immediately after the development was complete

and the other one was engaged as a free lance consultant and was not a permanent employee of

the company. The final member of the development team, who also was the Lead Developer /

Project Manager was only interviewed after the first CL session where he was also a participant.

Though the interview was delayed it worked out well for the research because it gave me an

opportunity to revisit, with him, some of the points he made during the first CL session.

For both users and developer the interviews were based on open ended questions (i.e. refer to

Appendix A, B and C) and though the questions were in English, for most of the users they were

asked in the local language (i.e. Setswana) for ease of their understanding. The responses by the

users were given using a mix of both English and Setswana, depending on the language the user

felt most comfortable conversing in. I translated and recorded the responses in English.

Observations

Since I had been engaged with the project since 2004, I have also used some of my notes and

observations that I made during the course of the project. These notes and observations are not

extensive and systematic in any way since at that time I had not yet received the necessary

permission to proceed with the research. Though not extensive, they have been found useful in

providing insight into current ISD practice.

Chapter 4 Research Design, Methodology & Data

72

Archives / Secondary Data

Archive data has been used as a secondary data source. The archive data has mainly been used

for the initial case analysis, especially as it related to historicity. I used archived research reports,

minutes from project meetings and other relevant reports such as the Government of Botswana

National Development Plan reports spanning the period 1966 when Botswana attained its

independence to now.

Change Lab Sessions

Two change labs were conducted as part of the research study, with participants drawn from the

GIT, functional users from the two projects approved for the study and all seven companies

known to offer system development services and operating in the country. The first change lab,

which ran for seven hours, held in November 2007 was attended by 22 participants from

government and the private sector. The major objective of this first session was to introduce the

research and to carry out the initial analysis of what constitutes current practice. This initial

change lab was conducted differently to how most DWR lab sessions are conducted in that I

opted to have different social actors make PowerPoint presentations on 1) the historical aspect of

current ISD practice, 2) how they were currently carrying out ISD projects 3) current

contradictions and 4) how current practice may be improved. The presentations were then

followed up with a discussion by participants on current contradictions and solutions to the

problem. The reason for this approach was that I wanted to garner support for my study from the

participants and I also wanted them to feel from the onset that they were involved in not only the

analysis of practice, but also looking for solutions. In terms of the change lab programme, I had

asked participants to focus on the following discussion points:

• Specific Botswana ISD project experience

• ISD methodology, techniques used including justification for choice of methodology

• Suitability of ISD methodology to specific projects

• Meanings that users in particular assign to the ISD methodologies used

• What learning took place on the projects by the different social actors i.e. users, and

developers

• Suitability of chosen methodology to system uptake and learning

Chapter 4 Research Design, Methodology & Data

73

• ISD practice challenges

• Suggestions for improvement

Prior to presentations and discussions by the developer firms on the points listed above, the

GITREP set the scene by taking participants through the historical development of the current

practice as well as outlining what in their view were the current challenges government was

experiencing in ISD projects. The user representatives also then shared their experiences and

what they perceived to be challenges with the current practice.

Before these presentations by users and developers I had given a presentation that explained the

research problem & objectives as well as covering CHAT concepts that would be used for the

research. The presentations also included a representation, based on the interview with the

GITREP, as well as my own observations, of the current ISD activity system using Engeström’s

activity system triangle.

The second change lab, which ran for about five hours, was conducted in April 2011 and during

this change lab I presented a model, based on suggestions from the first change lab as well as my

own input on what the improved practice should look like. After presenting the new practice

model I gave participants the following guideline questions for discussion: 1) Would this (i.e. the

new model) suffice and will it address the current learning challenges; 2) How can we make it

work in practice? Do we need to have a ‘Learning Contract’ in addition to the Memorandum of

Agreement between clients (i.e. users) and suppliers (developers)?; 3) How and when can we test

and implement this model? What needs to be done in order for us to implement and test this new

model (e.g. does the current government IT framework need to be amended?).

This second change lab did not have the presence of a GITREP whose participation was deemed

important for the adoption and diffusion of the new model. However for purposes of the practice

redesign, their suggestions for improvement to practice had already been provided at the first

change lab and therefore incorporated in the new model. The adoption and diffusion into practice

will be pursued as a separate study and will be reported on outside of this research.

Data from both change labs was videotaped for analysis. The use of video recording for these

change labs was convenient for me because I then did not need to take down any notes and it

allowed me to fully participate in the discussions. The recorder captured all of the proceedings in

Chapter 4 Research Design, Methodology & Data

74

full and even though the video recording was done by one of the Activity Theory Interest Group

(ATIG) members, I took responsibility for transcribing all the data because of my familiarity

with the data and also because the transcription also included some form of interpretation and

analysis.

Table 5: Research Data Summary

Type of Data Number

1. Interviews

• Interviews with GIT on Technology related matters 3

• Interviews with GITREP on ISD 1

• Interview with Functional Users from PEX project 14

• Follow-Up interviews with Functional Users of PEX project 5

• Interview with PEX Management 4

• Interviews with Developers of PEX project 2

• Follow-Up Interview with Developers of PEX Project 1

Total Interview Data 30

2. Observations

• Prototyping Sessions 3

• User Acceptance Testing sessions 2

• Training sessions 2

• System Piloting / Hand Holding 2

Total Observations 9

�� Archive / Secondary Data�

• PEX Project Reports 15

• PEX Project Minutes 20

• PEX Training Evaluation Forms 14

• Selective ISD Project 2 Documentation 6

• National Development Plans 5

• GIT Document Framework Library 1

Total 61

4. Change Lab Sessions

• Change Lab session November 2007 1 seven hour session

• Change Lab session April 2011 1 five hour session

Total 12 hours of change lab sessions (~ 6 CL’ s of

two hours each)

Chapter 4 Research Design, Methodology & Data

75

4.4 Researcher Role

As stated previously, as the researcher I was also one of the consultants involved in the case

project as an analyst initially (i.e. we developed the user specification) and later on providing

project management support during the design and development phases. The project

management role necessarily placed me on the side of the IS users and thus an active participant

involved, amongst other things, in ensuring the quality of the developer firms products and

services. Furthermore, I have a long standing relationship with some of the participants from the

GIT, as a previous employee of that department. In recognising and acknowledging these

relationships upfront, I want to ensure that the validity of the findings is not compromised in any

way. But, as observed by Dwyer and Buckle (2009), in terms of the qualitative nature of the

research, the ‘situatedness’ of the research means that the researcher (as subject) cannot divorce

herself from the research (object). Being an insider provided me with easier access to the data as

well as the potential candidates for interviews and change lab sessions. But once the data had

been collected I tried to distance myself from the insider role and assumed the outsider role of

analysing the data. This insider-outsider role is supported by the adopted DWR research

methodology.

4.5 Conclusion

In this chapter I have provided a discussion on the DWR research methodology adopted for this

research. DWR was selected because it provides a detailed framework based on CHAT concepts

which ties in with the objectives of this research. The chapter also provided a detailed discussion

of the data that was used to address each of the research questions. The initial field data used as a

‘mirror’ to analyse and reflect on current ISD practice was mainly based on a single case project

which I was engaged in at the time that permission was granted for me to carry out this research.

In fact at the time permission was granted, the post-implementation review had just been

concluded with one of the major findings being that of slow systems uptake, which I had

identified as one of the manifestations of ineffective learning in ISD practice. This, therefore,

made this particular project an ideal case for my research. My role as researcher, practitioner and

interventionist, which is acceptable for the chosen DWR methodology, has also been explained

in this chapter.

Chapter 5 Current Botswana ISD Practice

76

5 CURRENT BOTSWANA ISD PRACTICE

5.1 Introduction

In this research study I set out to involve IS practitioners from government and industry, as well

as users, in the collaborative review and redesign of current ISD practice and therefore as a

starting point it is important to have a detailed understanding of how ISD is currently being

carried out in Botswana. The description of current practice is provided in this chapter starting

off with identification and description of all the actions/tasks carried out in current practice. The

description provided here is based on interview data from interviews with the GITREP,

functional users and developers on the selected case project, as well as on secondary data i.e. the

GIT Framework library, the case project reports, and reports from the second project that I was

engaged in at the time.

5.2 The Current Botswana ISD Practice Model

As stated earlier, the formal description of how ISD projects are currently being carried out in

government was provided by the GITREP in an interview that was conducted in May 2007

which was around the time that I had received approval from government to proceed with my

research. According to GITREP, ISD projects are carried out following process steps which are

aligned to the Software Development Life Cycle (SDLC) i.e. Analysis-Design-Development-

Implementation, with formal sign-offs expected at the end of each stage (refer to Figure 11). The

process was in accordance with the GIT framework which was developed in 1999, to support the

decentralisation of IT services from the GIT to other government departments. The framework

was intended to provide guidance in all important areas of IT within Government including IT

Management & Planning, IT Service Management, IT Procurement, and IT Security. It also

defines procedures and standards that are to be adhered to by Third Party suppliers of IT

products and services to Government. For example standards have been included in the

framework for production of a Project Initiation Document (PID), Statement of User

Requirements (SOUR), Requirements Catalogue, Invitation To Tender (ITT), Acceptance Test

Specification (ATS), Procedure Definition.

Chapter 5 Current Botswana ISD Practice

77

Figure 11: The Current Botswana ISD Practice Model

The trigger of any ISD initiative, according to the GITREP is the indication of intent by a User

Department and about this the GITREP stated:

‘For commitment and sponsorship we want users / clients to initiate the process, indicate

requirements, reasons and benefits (for embarking on an information systems

development project). But (they) go into motions of computerisation not because they

understand the responsibility but because of appreciation of ICT as enabler. They believe

that IT can help solve problems’

This indication of intent is done in the form of a formal letter either to the GIT Department or

their representative in the specific User Department. Depending on the nature and size of the

project, this is followed by production of a budget for conducting detailed analysis of the

requirements and production of the SOUR. Currently, this is an activity which is outsourced and

the methodology and approach of developing the SOUR is determined by the analyst firm. But

the minimum standards for a SOUR document have been articulated in the GIT Framework. The

design and development of the software solution is also outsourced and here again the

methodology is determined by the supplier. In terms of project management, government has

Chapter 5 Current Botswana ISD Practice

78

adopted PRINCE2 (Projects in a Controlled Environment 2) as the project management

methodology and training of all IT officers across government was to be initiated.

I will now unpack this high-level description by the GITREP using the selected case project,

which is fully representative of how ISD projects are currently being carried out in Botswana,

since suppliers are all expected to adhere to the GIT framework.

5.3 The Case Project

The selected case project was, to a large extent, carried out in the manner described by the

GITREP. The case project was for a public entity X, which I will now refer to as the PEX.

Before going into the details of the project itself, I will provide a brief background on the PEX

organisation. This is then followed by a description based on the ISD process stages as outlined

by the GITREP i.e. the Requirements or SOUR stage, Design and Development stage, as well as

Support. The description of these stages is presented following the methodology as adopted by

the third party suppliers.

In addition to a description of the actions during the design and development stage, I also

provide a summary of the outcome of these actions i.e. the product or IT artefact that was

developed because even though the quality of the product is not being analysed as part of this

research study, it is indeed important to know about the end-product.

On the PEX project, though not standard practice, a post implementation review was carried out

and later on in this chapter I have reported on the findings. The findings of this PIR are of

particular interest to this study because they include an assessment of learning on the project.

5.3.1 The PEX Organisational Background

The core business for PEX, which is a unit within a much larger government research

department, is the multiplication of seed for the arable farming community. The PEX operates

from offices that are located outside of the capital city, Gaborone where they have a large land

area for growing and multiplying seed.

The PEX mandate of seed multiplication is achieved through the contracting of external farmers

(or seed growers) to grow the seed which is then supplied to the farmers by PEX, or through

growing the seed internally, on PEX farms. During the planting-growing-harvesting period, PEX

Chapter 5 Current Botswana ISD Practice

79

monitors the growth and quality of the seed produced through regular inspections of the

contracted Seed Growers farms or their own farms. Once the seed has been harvested it is

processed and packaged ready for sale to the wider farming community.

The PEX executes its mandate through five business units, namely: Inspection (Certified Seed),

Seed Laboratory, Basic Seed Production, Processing and Despatch (refer to Figure 12 for the

PEX functional structure). The system that the PEX required was to support all these five

business functions.

Figure 12: PEX Functional Structure

The Inspection (Certified Seed) Sub-Unit deals with the external seed growers in terms of

contracting them to grow seed as well as monitoring the seed growth through the planting-

growing-harvesting cycle. The Basic Seed function, on the other hand, is responsible for

monitoring growth of seed that is grown internally using breeder seed obtained from an

independent research arm of the same department that the PEX belongs to. Once harvested this

basic seed is distributed to the external seed growers for multiplication. Seed quality is important

to the PEX and this is provided by the Seed Laboratory as a support service to the Certified Seed,

Basic Seed Production and the Warehouse (i.e. Seed Processing & Despatch) Sub-Units. The

same services are also availed to external users from the private sector. This specialised service

involves carrying out various tests, based on local and international testing standards, to

Chapter 5 Current Botswana ISD Practice

80

determine the quality of the seed produced. The most common tests carried out are: Purity Test,

Moisture Test and Germination Tests. The Processing Sub-Unit is responsible for cleaning,

grading, treating and packaging both basic and certified seed. At the time the project was carried

out, the Unit had three warehouses, one open shed and one cold room where the basic and

certified seed are stored for future sales and dispatch. In order to maintain the quality of the seed

the storage facilities are kept clean at all times and in cases where existence of weevils has been

identified, the facilities are fumigated and sprayed. The Despatch Sub-Unit is responsible for

seed sales and despatch to all types of client i.e. from government or the private sector. The

breakdown of PEX staff by business unit is as shown in Table 6.

Table 6: PEX Staff Profile

Business Unit Professionals Artisans Technicians Farm

Workers

Others

(e.g. Stores)

Total

Inspection 1 2 3

Seed Lab 2 2 4

Basic Seed Production 1 1 8 10

Processing 2 2

Warehouse/Despatch 1 2 3

Total 2 3 7 8 2 22

The table shows that most of the PEX staff comprises of technicians and farm workers. This is

the pool of resources from which the functional users of the PEX project were drawn from. At

the very top of the PEX structure is the Head of the Organisation and the Deputy who the PEX

had direct reporting lines to. It is at this level of the organisation that the need for the PEX

system was conceptualised. The analysis of how ISD projects are conceptualised will later show

that there is a contradiction between the level at which decisions are made and participation in

the project.

Chapter 5 Current Botswana ISD Practice

81

From the training needs analysis that was carried out for the new PEX system, it was concluded

that users did not have sufficient knowledge of computers, and therefore as part of the delivery

of the PEX system, basic computer training was to be provided first, together with basic training

on desktop applications i.e. MS Word and MS Excel.

Prior to this project, the PEX or indeed the department within which the PEX was located had

not been engaged in a large scale ISD project of this nature, especially with external service

providers involved. This was therefore a new experience to the staff and the organisation. From

the onset it was a challenge to make sure that the right people at the right levels were involved in

the project. The culture was such that IT projects were for IT people and so both management

and users did not think that their input was crucial.

5.3.2 PEX Project Conceptualisation

Over a number of years PEX was experiencing problems and limitations with data collection,

management as well as forecasting of seed demands for upcoming seasons. The PEX was using a

standalone DOS based database system that was developed in-house using Dataease (i.e. a 4GL

database management system). The system had been in use since 1996 and it only provided for

basic information input and output (e.g. relating to daily seed processing, receipts from farmers /

seed growers, (basic) seed despatch to farmers / seed growers, etc), with access limited to one or

two individuals on a standalone environment / computer. In fact what used to happen was that

various forms were submitted to a central location (IT Office) where data was captured on the

system followed by the production of standard reports. This movement of forms was blamed for

the sometimes incomplete information as forms were lost and did not reach their destination. The

limitations with the current system, together with advances in information and communications

technology were cited as some of the reasons for wanting to embark on this project with the

major aim being to develop and implement a more comprehensive system that would improve

the PEX practice. According to the PEX IT Manager, the decision to develop a new system to

improve the PEX work practices was taken by Management, and more specifically the previous

Director of the organisation. At the time that I became involved with the project a new Director

was in post and from the interview I held with her in May 2004, she expressed concerns about

their inability to forecast seed demands and thus ensure that they always have the required seed

quantities to sustain the nation for a period of time, including during drought periods. This, she

Chapter 5 Current Botswana ISD Practice

82

said, was one of the major reasons a new PEX system was required. These concerns were shared

by her immediate deputy, who was a direct supervisor of the PEX unit, who commented that:

‘We always need to have enough seeds for two seasons ... and so we need to be able to

forecast demand. We also have to distribute seeds for free to farmers during a drought,

but we do not know what the national seed requirement is. ’

The decision to develop a new system was, therefore, a management decision with little or no

involvement of staff. It took ten (10) years from conceptualisation in 1997 to the PEX system

implementation which was only completed in 2007. The SOUR was completed in 2004, and the

design and development only commenced two years later in 2006. This time lag presented

challenges in that there were significant staff movements during that period, including the

departure of the Director who had conceptualised the project.

The PEX project was made up of two components i.e. the IS component and the IT or

technology component which was concerned with the supply, delivery, installation and

commissioning of hardware artefacts. The two project components were carried out in parallel

with the hardware delivery timelines such that all equipment was in place by the time the training

and testing of the PEX solution begun. The focus of this study is on the IS side of the project

delivery.

5.3.3 Project Management Process

The project management process followed guidelines as provided for in the GIT framework, with

a Project Initiation Document (PID) produced as the initial output outlining how the project was

to be carried out, managed and controlled. The PID provided for sign-offs at each stage of the

process and more specifically for each of the project deliverables. The sign-offs as specified

were done religiously on the PEX projects, however, there was no assessment of the

understanding of all those involved at each stage of the project. It was assumed, as was practice

that everybody was on board. It only struck me that not everybody was on board when one of the

users during testing of the system said:

‘Aha ... OK ... this is what we wanted to do all along ...now I understand’

This was a telling statement, which contributed to my decision to study learning within ISD and

it also influenced my decision to use this particular project as the case project for this study.

Chapter 5 Current Botswana ISD Practice

83

The project structure comprised of a Project Implementation Committee, a Project Manager, and

the Functional User Team supported by the PEX IT staff. The structure, as depicted at Figure 13,

shows at a high level the social actors that were involved in this project. This is very typical of

ISD projects in Botswana. The social actors represented here participated in the two change lab

sessions to review and redesign practice.

Figure 13: PEX Project Structure

The (PIC) was responsible for, amongst other things, project coordination, and deliverable

quality reviews. Membership of the PIC comprised of the head of the PEX, functional users (i.e.

from the five sub-unit of Inspection (Certified Seed), Seed Laboratory, Basic Seed Production,

Processing and Despatch), representatives of the analyst firm, the developer firm, and

representation from the IT function of the Ministry to which the PEX belonged. Though the PEX

Management was not represented in the PIC, there was provision for them to receive regular

briefings from the Project Manager. This, however, did not happen as regularly as had been

envisaged due to their unavailability. The Project Manager was the IT Manager for the PEX,

supported by the analyst firm that had developed the SOUR. The analyst project management

services were provided on a part-time basis and were only for the development stage of the

project – the support phase was not included. The profile of the functional users is provided in

Table 7 below. The profile shows that most of the functional users had diplomas and certificates

Chapter 5 Current Botswana ISD Practice

84

most of which were acquired thirteen to thirty eight years ago. Selection of functional users was

done by the Head of the PEX and where possible, the same team that was involved during the

SOUR phase of the project was retained for the design, development and implementation. But,

throughout the project it was a challenge retaining the same people.

Table 7: Profile of Functional Users involved in the PEX Project

Level of Qualification No of Users Year Obtained

Masters 1 2002

Degree 1 1992

Diploma 5 1988, 1990, 1998, 2006

Certificate 5 1973, 1981, 1988, 1990

None 1 N/A

In terms of project control, the PIC met fortnightly for progress monitoring and control, as well

as at the end of each stage for deliverable quality reviews. There was also provision for the PIC

to meet on an ad-hoc basis in case of exceptions that needed to be addressed urgently.

5.3.4 PEX system requirements

The PEX system requirements elicitation and documentation was done by an external supplier –

the analyst firm, of which I was the lead analyst. The choice of methodology for development of

the SOUR was left to the supplier and in this case we used a combination of the Critical Success

Factor (CSF) method by John F. Rockart (1979), and structured analysis techniques through the

use of data flow diagrams. The final SOUR document comprised of a description of the current

system (i.e. using DFDs) as well as a simple non-technical description of the requirements.

Requirements catalogues as well as a data dictionary were also produced in line with the

requirements of the GIT Framework. The SOUR requirements were obtained from the PEX

Management and functional users through change labs and interviews. Full day change labs were

conducted for each of the PEX functions / sub-units where requirements elicitation was

facilitated by the analyst firm.

The details of the PEX system requirements have been documented in the SOUR (2004)

document following the GIT standard for such documentation. Requirements were specified for

Chapter 5 Current Botswana ISD Practice

85

each one of the PEX functions. Some of the key requirements included the ability to capture all

details of a seed grower based on their application and also the ability to automatically vet the

applications based on predefined criteria. The system was to allow flexibility in setting up the

vetting criteria for such applications. Once the seed grower had been contracted through the

system, their performance was also to be monitored through the system. This was to be carried

out through the maintenance of inspection report findings captured at each stage of the growing

process. In terms of the inspections functionality, a scheduler was required to assist the

inspectors in scheduling inspections including having some sort of prompts or alerts for

inspections that are due. In order to address the Seed Lab requirements, the PEX system was to

provide the ability to receive samples through capturing sample details into the system and

generating a unique laboratory number for each sample. Once the testing and analysis were

complete, the results would be captured into the system and the relevant reports generated

including the test certificate. This seed lab functionality was meant to support testing of samples

for both internal and external seed growers.

In terms of Seed Processing, the system was to provide functionality for receipt of seed from

various sources including interfacing with the existing weighbridge system as well as production

of seed pocket labels for packaging the processed seed. The warehouse functionality as provided

for in the SOUR included the ability to maintain warehouse details in terms of their location and

size / capacity. It also included the ability to receive seeds into the warehouse, allocating it for

storage in specific areas in the warehouse, issuing of seed four sale and monitoring of stock

levels. In terms of the key non-functional requirements, the new system was to be modular with a

Graphical User Interface (GUI) (i.e. from DOS to windows based) operating in a secure multi-

user environment. Finally a number of standard reports were specified for generation by the new

system (e.g. Seed Growers monitoring report, Seed Inspection Reports, Seed Testing Certificate,

Seed Pocket Labels, Seed Processing Report etc.).

The new system would be made available to all PEX functional users with data captured at

source. As a result there would no longer be any movement of forms for centralised data capture

and report processing. Furthermore access was to be provided to management for viewing /

printing relevant reports.

Chapter 5 Current Botswana ISD Practice

86

The requirements as specified for the new system were a significant improvement to the existing

system and therefore the system was expected to address most of the user concerns and yield

significant benefits (PEX SOUR, 2004). The anticipated benefits would be the ability to monitor

the performance of Seed Growers, since all information relating to their contracts and findings

from inspections would be in the new system. The maintenance of inspection reports was

expected to help improve inspection management including ensuring that scheduled inspections

were not missed since the system would provide alerts. The benefit of having a Lab Test module

was viewed as an improvement in seed analysis as it ensured that international standards for

testing of seed were adhered to since the functionality would be built into the new system. The

enforcement of standards for say the picking sequence (i.e. in this case FIFO) when seed was

being issued, would be a major improvement to current practice where the picking sequence was

not consistent resulting in old seed staying in the warehouse for long periods at the risk of

spoiling and being disposed of unused. A further benefit, which was of major importance to the

PEX, was the improvement to seed forecasting capability based on the ability of the system to

maintain up to date stock levels and demand (based on despatch data). There would also be

reduction of inventory investment and purchase costs through improved inventory monitoring.

Furthermore, the rule enforcement by the system would ensure better transaction controls e.g.

inspections were to be carried out in sequence and the system was not to allow updating of say

the harvesting stage inspection before the pre-flowering inspection had been done.

5.3.5 Design and Development

The design and development of the PEX system was outsourced to an external service provider,

whom I refer to as the developer. The developer’ s choice of methodology was Rapid Application

Developing (RAD) using prototyping. Figure 14 depicts the development process as used by the

developer firm.

Chapter 5 Current Botswana ISD Practice

87

Figure 14: Design and Development process for the PEX system

The development team from the supplier side comprised of five members and the division of

work was as shown in Table 8.

Table 8: Division of Labour for the Developer Team

Team Member Tasks

Lead Developer Analysis, Design & Quality Assurance plus project

management

Developer 1 Analysis, Design & Coding

Developer 2 (Sub-Contracted) Coding

Developer 3 Coding, User Training, Support during testing, post-

implementation support

Developer 4 Coding & Documentation

Various tools and techniques were used during the design and development i.e. a combination of

PMBOK and PRINCE2 were the project management methodologies with MS Project as the

tool; VB studio was used for developing the GUI, FastHelp was used for the Help facility, Visio

was used for documenting the data flow diagrams and entity relationship diagrams.

In the next few paragraphs I will provide a brief description of the design and development tasks.

I only include tasks that were visible to the client, even though there were other tasks such as

Chapter 5 Current Botswana ISD Practice

88

coding, unit testing, system testing, system documentation etc. that were done by the developers

independently and without the involvement of users. These tasks were carried out off-site.

Requirements Confirmation and Scoping

The first exercise that the developers engaged in was validation and confirmation of the

requirements as stipulated in the SOUR document. Though requirements had been sufficiently

documented and presented by the analyst firm, the developers needed to have their own in depth

understanding using their own tools and techniques for requirements elicitation and presentation.

This inadvertently meant that the users had to go through the whole explanation process again.

The only difference being that now not only did they use their own understanding of their work

practice – but the users were also using the analyst firm’ s representation of their work practice as

documented in the SOUR. This was done through a series of change labs with the various

functional user groups. The output from this exercise was the Requirements Confirmation

Scoping Document. The fact that there was a detailed SOUR in place ensured that less time was

spent by the developers in validating and confirming the requirements.

Prototyping

There were ten (10) prototyping sessions held even though originally there only meant to be

three (3) sessions, where the functional user groups were asked to review and provide inputs to

various aspects of the development. Initial change labs focused on the design and review of static

screens and in the latter sessions there was some logic built into the screens for process review.

The prototyping sessions were being held at the PEX premises in a room that had been dedicated

specifically for this work.

The planning, coordination and control of the prototyping sessions was the responsibility of the

developers. During the sessions we had the lead developer facilitating the sessions by taking the

users through the screens / system using a laptop and projector. There were usually two or three

other developers available to provide assistance. They kept minutes and notes of the sessions as a

record of what transpired, but also as reference for any user change requests. The users were also

given printouts of relevant screens to review and make changes. The prototyping sessions

presented learning opportunities through brainstorming and idea generation to improve the PEX

system design as well as triggering further discussion on current work practice for better

Chapter 5 Current Botswana ISD Practice

89

understanding by the developers. But initially it was difficult for the developers, as facilitators of

the sessions to get the users to engage and contribute in the brainstorming and discussions when

the analyst firm’ s team was not there.

Once the prototyping sessions had been completed, the developers proceeded to complete the

rest of the coding and development of the PEX system.

The Developed PEX System

The PEX system was custom built and was based on an n-tier architecture using MS Windows

2003 Server for the operating system, MS SQL Server 2005 for its database and MS Visual

Basic 2005 Edition for the graphical user interface.

The system design and functionality followed a modular, menu-driven design as was desired

with the core functionality provided through five modules namely, the Seed Growers

Maintenance, Crop Management, Seed Testing, Seed Processing, Seed Inventory Management,

Seed Purchasing, Seed Sales and Asset Management, Maintenance and Calibration modules.

These modules are a direct match to the PEX functions as shown in the table below (Table 9).

Table 9: PEX System Functionality

PEX Function PEX System Functionality / Module

Inspections / Basic Seed Seed Grower Maintenance

Crop Management

Seed Purchasing

Basic Seed Crop Management

Seed Laboratory Seed Testing

Seed Processing Seed Processing

Seed Inventory Management

Asset Management, Maintenance & Calibration

Seed Despatch Seed Sales

Chapter 5 Current Botswana ISD Practice

90

From a users perspective the most attractive aspect of the new system was that it was GUI-based

and it was operating in a multi-user environment, allowing users to access functionality that was

relevant to their work practice.

Once developed, tested and signed off, the PEX solution was deployed at two sites i.e. a

production site and a disaster recovery site with requisite infrastructure allowing for mirroring

and data replication between the two sites.

Training

Training was provided over a one week period and trainees were divided according to the system

functionality groups / modules which were closely aligned to the PEX functional structure. The

training sessions were formally structured and users, though sharing machines, were interacting

directly with the system during training. The training objectives were outlined as:

• To familiarise the users with the whole system

• To familiarise each user group with their specific modules

• Preparation for user acceptance testing

• Introduction and finalisation of User Guide

• To make sure that all functionality required has been incorporated into the system

On completion of the training, training evaluation forms were completed by each participant and

overall rating for the training and the trainer was said to be ‘Good’ (i.e. based on a rating scale of

Poor, Average, Good and Excellent). The conduct of the training allowed for ‘play-like’

activities and the formal manner in which the training was planned and conducted ensured that

the users were aware or ‘conscious’ of the fact that they were engaged in a learning activity.

User Acceptance Testing (UAT)

The testing was carried out once the system had been fully developed with the logic built into it.

It was carried out by the functional users who were being supported by the developer team. A

representative of the analyst firm was also available during the testing. The functional users

received one week training on the system prior to commencement of the UAT. The test plan had

been developed jointly between the users and developers. The users had to then prepare the test

Chapter 5 Current Botswana ISD Practice

91

data for use during testing. The UAT took three (3) weeks instead of the planned two weeks

because it was only during the testing that users, especially from the Lab, began to understand

what they were going to get system-wise and therefore took their time in the testing. As a result a

lot of changes were requested by the Labs during the testing.

Once the UAT was completed and signed off by the users, the product was presented to PEX

Management. The approach taken was that the functional users presented their respective

modules to Management instead of having the developers do it. Management were seeing the

system for the first time and not surprisingly, came up with a number of changes that they

wanted incorporated into the system.

Piloting

The PEX system was piloted for a period of three months before finally ‘going live’ . The

piloting was intended for end to end testing of the seed multiplication process in a ‘live’

environment using real data and not test data. All the functional user groups were involved and

encouraged to use the system for all their daily transactions. The developers provided on-site

support / handholding during this piloting phase.

5.3.6 Post-Implementation Support

The developer firm was retained by PEX to provide support and maintenance on the system for

an initial period of two years. In terms of the support, PEX had assigned one of the (junior)

developers who had been involved in the development as a dedicated support resource. But two-

three months into the support contract, the designated resource resigned from the company and

was replaced by a new COX recruit who had not been involved in the development. The support

procedure was such that PEX users would log faults / problems with the COX help desk and

depending on the severity of the fault / problem the COX would send a representative on-site to

resolve the problem.

5.3.7 Post Implementation Review

5.3.7.1 Objectives and Scope Currently conducting post implementation reviews is not part of standard practice. But in the

case of the PEX project, a PIR was carried out. The review was carried out six months after

Chapter 5 Current Botswana ISD Practice

92

‘going live’ , which was deemed to be sufficient time for the users to have started to confidently

use the system. The main review objective was to assess system effectiveness, but in light of this

research study I also added one or two questions that addressed individual impact and learning.

Table 10 summarises the scope of the review.

Table 10: PEX Project Review Scope (from PIR Report, 2008, pg 7)

Review Area Scope Liaison With

System Effectiveness • system features • system utilization • information accuracy and data

content • processing schedules • response times • security and controls

Users

System’ s compliance with requirements

• Evaluate compliance against both functional & Non-functional requirements

Users

Developers

Training and Documentation • Training effectiveness • Level and type of training

provided • Adequacy of training manuals /

documentation • Adequacy and completeness of

procedure and user manuals

Users

PEX Project Manager

Developers

Hardware Infrastructure Review

• Adequacy of processing and storage facilities

• Adequacy of disaster recovery plan and procedures

• Networking capabilities

PEX Project Manager

GIT

Support & Maintenance Review

• Evaluate adherence to the SLA’ s • Review adequacy of support

procedures

Users, PEX Project Manager

Developers

Systems development process • Methodology & Approach • Organisational Impact • Individual Impact including ‘what

has been learnt’

Users, PEX Project Manager

Developers

The data for the review, as stated earlier, was collected through written interviews based on

open-ended question formats (i.e. Appendices A, B and C) with all the users as well as the

developers. I took responsibility to administer the interviews myself and at the beginning of each

interview I explained that I would also be using the data for this research and therefore requested

for consent.

Chapter 5 Current Botswana ISD Practice

93

Findings from the review are detailed in the PEX PIR report, but for purposes of this research

study I have included some of the key findings and more specifically those that have a bearing

on learning, which is of interest to this research.

5.3.7.2 Post Implementation Review Findings System Effectiveness and Compliance to Requirements

Though the findings from the review suggested that the PEX system developed was consistent

with the user requirements and the users were confident that it addressed business and processing

requirements, even at the time of the review it had still not been fully adopted. As observed by

one of the developers ‘(we) have succeeded in providing the system, but the take-on is slow.

(some) Users take (the) system as a burden as opposed to something that will make their work

better… ’ About this the PIR Report (2008) notes:

‘It was difficult to (fully) assess system usefulness, response time, information accuracy and processing

schedule because the system is not being fully utilised. The major reasons given were that the PEX was

experiencing intermittent network problems. The other contributing factor was the lack of data, especially

as it related to current stock. There were delays in completing the stock taking exercise and capturing the

necessary data into the system. This meant that certain tasks could not be completed in the system because

of restrictions imposed by the business rules.’ (PIR Report, 2008, p. 9)

The delays in completing the stock count were attributed to some user’ s resistance to the system

and therefore not wanting to carry out their responsibilities.

Training and Documentation Findings

Though they found the training to have been good and relevant, most of the users felt that it was

too short. Again this may have been because, it was only during training and testing that users

interacted with the full system. One user when responding to a question on what they enjoyed

most about the training said: ‘Entering the real data into the system, it became much more

clearer and very relevant’ .

Support & Maintenance

The change of support personnel a month into the support contract was cited as a major problem

by users. This, as expected, initially brought about some challenges because the users were still

learning and so was the support person. Though the users, in their evaluation had said the

Chapter 5 Current Botswana ISD Practice

94

training provided had been effective – most of what was happening during the support was

training. As one of the developers observed when asked about the effectiveness of the support,

‘... (its) very frustrating because it is more of training than support... to gain understanding of

how the modules work is a struggle ...’ . This seems to suggest that even at that late stage there

were issues of user learning that could be traced back to the ISD process itself.

Systems Development Process

As stated earlier the project was originally conceptualised by the management of PEX who were

not even represented in the PIC. Some of the key project resources who were there at the

beginning when the project was conceptualised changed during the course of the project

implementation i.e. the project sponsor changed and so did the principal user and some of the

functional users. This created problems with consistency and continuity since those who were

there to drive and agree on the analysis phase were not there during the design phase. Also,

those that came in required time to learn first about the seed multiplication work activity and

then also try to catch up with the project and provide meaningful input. As one of the users

remarked ‘ I am new in the Lab (when I joined the project) so the project / system development

assisted with understanding / learning Lab work; it forced me to read so as to provide input on

new screens developed; I also learnt more about the seed multiplication business processes as a

whole.’ Out of the fourteen people interviewed post implementation, only four were involved in

the project during the SOUR phase.

The use of slightly different representation techniques, presented a challenge for the users and as

such it took quite a number of prototyping sessions before the screen designs could be finalised

and accepted. As observed by the client project manager, ‘The SOUR workflow was closer to

users so they could follow; Design stage DFD’ s (were) confusing to users until the screen

design, users could now follow especially once the logic was built-in; training also cemented

understanding’

One user suggested the lack of exposure to computers as a contributing factor to the slow

transition from the SOUR to the design & development phases ‘I understood the SOUR phase,

but it was my first exposure to computers and so I found it difficult to understand the design and

development process. I understood objectives from SOUR to Design & Development but the

problem is in depth understanding of computers’ . As pointed out by the lead developer ‘...

Chapter 5 Current Botswana ISD Practice

95

initially they were more comfortable talking to ... (the lead analyst who also happens to be the

researcher) than us ... spent a bit of time knowing each other ... learning each other .... took a

while for them to trust us ...’ . As a result of this the transition from the Analysis phase (tools and

object) to the Design phase took some time.

The prototyping sessions provided learning opportunities in three out of the four possible

learning opportunities mentioned by Bødker and Grönbeck (1996). These were in brainstorming,

idea generation and in instances where the focus was on the prototype itself i.e. that was when

during the demonstration there was a system error of some sort. This occurred mainly during the

latter parts of the prototyping sessions when some logic had been built into the system. The

learning situation presented by simulation of work-like actions using the prototype was not that

evident, mainly I would think because the prototyping approach that was used was different from

the one used by Bødker and Grönbeck i.e. a full prototype system had not been developed, but

instead static screens and minimal logic were what was used. Furthermore, the users did not have

direct interaction with the prototype – it was more of a demonstration. When asked about

whether the selected approach was a contributory factor to user learning and therefore slow

system uptake, the lead developer stated that they had deliberately chosen that approach because

in their assessment, use of a fully fledged mock system would have distracted the users and

resulted in more re-engineering work. He said ‘... we look at the people involved on the client

side ... if we think the fancy part (i.e. logic) would be distractive we leave it out ... from the

beginning we had unease about whether we would get agreement on screens ....’ He explained

that the low level of user participation during the requirements validation change lab led them to

conclude that the use of a ‘static’ prototype would be the best approach for the PEX project.

Organisational and Individual Impact

This was an important question that was included in the PIR in order to address the concerns of

this research. The following responses were given by the fourteen users and two developers that

were interviewed.

Chapter 5 Current Botswana ISD Practice

96

Table 11: Users and Developers PIR Responses on Learning

Users

User 1

‘I learnt about the value of using computers, the importance of in-depth knowledge of use of

the system. It puts Botswana on the map with regards to IT use and has resulted in

excitement and motivation to work. It will assist towards obtaining Lab accreditation.’

User 2

‘I need more time to reflect on individual impact, but it has opened up my mind to work

opportunities’

User 3

‘I was new in the Lab so project / system development assisted with understanding / learning

Lab work. It forced me to read so as to provide input on new screens developed. I also learnt

more about SMU business processes as a whole.’

User 4

‘I learnt how to use a computer and that it’ s easy to store volumes of information e.g. on a

memory stick. I also learnt how to type and also that analysis translated business processes

into work that could be automated which was beneficial’

User 5

‘Learnt how to manage records.’

User 6

‘The system could be useful if operational and could assist with data management.’

User 7

‘This was my first involvement in an IT project. I learnt the value of using the system to

support business processes. I also learnt that computers are faster and more accurate than

human beings. Furthermore, I learnt the value of computer storage and security provided

through such storage as opposed to maintaining manual documentation’

User 8

‘I learnt the ideal way of operations through automation since the system enforces business

rules. But this may also act as a constraint especially as it relates to Inspection.’

User 9

‘ I am a previous computer user, but this current system is different from those used before’

Chapter 5 Current Botswana ISD Practice

97

User10

‘I learnt how to use a computer since it was my first encounter with it. Creating Lots in the

warehouse was a new thing.’

User 11

‘I learnt how to use the system and the need to have complete information in order to process

transactions.’

User 12

‘I am still learning about computers. I learnt the need to capture data on time and follow

process flow as defined to benefit from the SMIMS implementation.’

User 13

Blank

User 14

‘I learnt how to handle people who are using computers for the first time i.e. resistant users.

Also human-computer interaction. I think younger users would have enjoyed and benefited

from being involved in the development.’

Developers

Developer 1

‘ Gained an understanding of the PEX environment and most importantly that even within

the same Ministry or government environment you may require a different implementation

approach’

Developer 2

‘Learnt how to manage clients’

The first user response suggests that the system had brought about work improvement that may

even result in accreditation of the (lab) work practice. The is the same user who only seemed to

have realised what was going on in the PEX project during testing and as a result a number of

changes had been requested to the system design. It would therefore appear from this statement,

that understanding, even if it occurred during the latter stages of the design and development was

crucial to the final outcome or artefact. I was therefore left to wonder how much more could

Chapter 5 Current Botswana ISD Practice

98

have been achieved if understanding of the process had been obtained earlier on in the project. I

also wondered whether evaluating that understanding throughout the process could be of value.

These are thoughts that I took up during the change lab sessions where, I, together with other

practitioners reflected on practice as reported on in the next chapter.

The fourth user response was from a user who was involved in the project from the analysis

phase of the project who observed that though when the project started they did not have much

understanding of the ISD process they had learnt how from analysis you could end up with a

working system which they now had.

User 5, 6 and 7 responses point to learning about specific areas of work practice that had been

improved by the new artefact, e.g. management of records and data management. It’ s learning

about the value of using computer technology to support business processes which seems to

suggest that it was something that had not been anticipated especially given that the old system

operated in a standalone environment and therefore most users did not interact with it much.

User response 8 pointed to learning about process flow and business rules that needed to be

followed as imposed by the system. The enforcement of business rules was viewed both

positively and negatively. The positive aspect was that it was now possible to ensure strict

adherence to procedures and standards. The negative side, according to the users, was that it

could be a constraint since for example with Inspections the system did not allow skipping of

stages. The response by user 9 also seems to suggest that because the PEX system offered more

than what they had used before in terms of a computer application, the learning was therefore at

a much advanced level.

The creation of Lots in the warehouse (User 10) was a business improvement brought about as a

result of the automation. Coming up with lot numbers that could be used to identify seed from

planting through to when the seed was processed, packaged and stored in the warehouse was a

major challenge throughout the project. During the prototyping sessions various numbering

systems were suggested and tried out until eventually the group agreed to one which they all felt

would work. It was an interesting learning cycle of questioning, modelling, testing, modifying

and then testing again.

Chapter 5 Current Botswana ISD Practice

99

In summary learning by users took place at different levels depending on their level of IT

literacy. For example, for new computer users, the learning was on the use of computers, their

value and potential. Whereas for users who had prior exposure to computers, learning was on

how automation can be achieved through the ISD process and on business process improvement

e.g. the lots example. Interestingly though, none of this learning as listed led to motivation for

high system utilisation and uptake. Thus the question that still remained was why despite this

reported learning there was still slow system uptake. Hence my desire to bring together IS

practitioners to review the current process and suggest improvements that would enhance

learning and system uptake.

At stated previously, during the PIR it was only possible to interview two out of the five

developers involved in the PEX project. Though the lead developer was also interviewed, this

was only done after the first change lab session and the interest then was to follow up on some of

the issues raised at the change lab. However, the two developers interviewed reported learning

mainly on how to manage clients in different environments. As developer 1 pointed out, despite

their experience in developing and implementing systems for other government departments –

the PEX project presented yet again a different environment which they needed to understand.

The slow systems uptake was also a concern for the developers and this particular developer later

stated his reflections on the project that:

‘We could have done better if we had a better understanding of the environment. More

change labs with the key users were required to match their expectations of where they

see the system fitting into their environment’

5.4 Conclusion

In this chapter I have presented a description of current ISD practice in Botswana by identifying

the key actions as described by the GITREP as well as the tasks as carried out in the case project.

The findings from the post implementation review confirm my concerns about slow systems

uptake when the actions /tasks are carried out in a manner described in this chapter. Though

there are a number of interesting factors such as the prototyping methodology used, and the

profile of the functional users that one could conclude as having contributed to slow system

uptake, I chose to leave the analysis to a wider group of users and practitioners. This way

Chapter 5 Current Botswana ISD Practice

100

whatever new ISD practice model was arrived at would have wider acceptance and applicability

within the government system. I therefore set out to engage as many practitioners and users as

was possible in the review and redesign of practice. I also wanted to establish whether this was a

problem experienced in other government ISD projects and if it was, to find a solution that could

be implemented across all government projects. In the next chapter I report on how a group of

users and developers came together in two change lab sessions to review and redesign the ISD

practice in Botswana.